Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Network Security

Easily Exploitable Vulnerability Found in Netis Routers

Routers produced by China-based networking solutions provider Netis Systems are plagued by a security hole that can be leveraged by an attacker to gain control of the devices, Trend Micro reported on Monday.

Netis Systems is part of the Netcore Group, which is headquartered in Shenzhen. Their products are sold under the Netcore brand name in China and as Netis is other parts of the world. According to the security firm, Netis/Netcore routers are exposed by a backdoor that can be easily exploited.

Routers produced by China-based networking solutions provider Netis Systems are plagued by a security hole that can be leveraged by an attacker to gain control of the devices, Trend Micro reported on Monday.

Netis Systems is part of the Netcore Group, which is headquartered in Shenzhen. Their products are sold under the Netcore brand name in China and as Netis is other parts of the world. According to the security firm, Netis/Netcore routers are exposed by a backdoor that can be easily exploited.

A remote attacker that knows the targeted router’s external IP address can gain access to it through the UDP port 53413. In order to get to the actual backdoor, the attacker must enter a password, but this feature provides little protection because the password is hardcoded in the firmware. Furthermore, all Netcore/Netis routers seem to have the same password.

Trend Micro Threat Researcher Tim Yeh believes most routers are plagued by this flaw. A scan performed with ZMap, the open-source network scanner that allows researchers to conduct studies, revealed that there are two million potentially vulnerable devices. While most of them are located in China, some have been found in South Korea, Taiwan, Israel and the United States.

Once logged in, an attacker can perform a wide range of tasks, including download, upload and execute files.

“This gives the attacker near-complete control of the router. For example, settings can be modified to help carry out man-in-the-middle attacks,” Yeh explained in a blog post.

Experts noted that the documentation for these Netcore/Netis routers doesn’t mention anything about the backdoor and what it might be used for. Trend Micro said it reported the existence of the flaw to the manufacturer but received no response. SecurityWeek has also reached out to the company, but hasn’t heard back by press time.

The security firm says users can’t do much to address the issue. The best option is to stop using the vulnerable devices. The easiest way to determine if a router is affected is to probe port 53413 with an online scanner.

Advertisement. Scroll to continue reading.

Vulnerabilities in small office/home office (SOHO) routers are not uncommon. At the SOHOpelessly Broken contest that took place at the DefCon 22 security conference, researchers reported a total of 15 zero-day flaws.

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

Shaun Khalfan has joined payments giant PayPal as SVP, CISO.

UK cybersecurity agency NCSC announced Richard Horne as its new CEO.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Vulnerabilities

Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.